CN101365195A - Method for mobile phone customer management and functional shielding - Google Patents
Method for mobile phone customer management and functional shielding Download PDFInfo
- Publication number
- CN101365195A CN101365195A CNA2008100421170A CN200810042117A CN101365195A CN 101365195 A CN101365195 A CN 101365195A CN A2008100421170 A CNA2008100421170 A CN A2008100421170A CN 200810042117 A CN200810042117 A CN 200810042117A CN 101365195 A CN101365195 A CN 101365195A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- configuration information
- user
- function
- functional
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
The invention discloses a method of mobile subscriber management and function screening. The method comprises the following steps: 1) setting the function configuration information recording the function that a subscriber has access to in the mobile phone according to the subscriber ID; 2) when the mobile is powered on or logged in again, inputting the subscriber ID required by the mobile; 3) according to the input subscriber ID, reading the function configuration information corresponding to the subscriber ID by the mobile; and 4) according to the function configuration information, carrying out the system configuration, loading the function recorded in the function configuration information, and then entering the standby mode. By adopting the method, when different subscribers use the same mobile or the mobile subscriber lends the mobile phone to others, partial function of the mobile phone can be screened, so that the others cannot get to and use the screened function of the mobile phone.
Description
Technical field
The present invention relates to the method for a kind of mobile phone customer management and functional shielding.
Background technology
Mobile phone has become necessary tool in people's daily life.Mobile phone in the market has only a kind of user model mostly, as long as after anyone opens mobile phone and enters into standby interface, can use the repertoire of this mobile phone and check that all are kept at the information in the mobile phone.Open day is on June 25th, 2008, the applying date is on December 20th, 2006, name is called " a kind of method that realizes interior multi-user management of mobile phone and Information hiding " patent application, discloses method of carrying out multi-user management in a kind of mobile phone and the method for under multi-user's environment the information of mobile phone being hidden.This method has only realized the call record, note or the file that are kept in the mobile phone are hidden, and can not shield the various functions of mobile phone, and different user still all can use all functions in the mobile phone, has brought inconvenience to the user.
Summary of the invention
The method that the purpose of this invention is to provide a kind of mobile phone customer management and functional shielding uses this method can the various functions of mobile phone be shielded, and different users is spendable function difference when using mobile phone.
The method of a kind of mobile phone customer management and functional shielding comprises the steps:
1) according to user name the functional configuration information of having put down in writing the function that this user has the right to use is set in mobile phone;
2) when the user starts shooting or lands again, mobile phone requires to input user name;
3) according to the user name of input, mobile phone reads the functional configuration information of this user name correspondence;
4) according to described functional configuration information, mobile phone carries out system configuration, after the function of putting down in writing in the value-added tax function configuration information, enters holding state.
Described step 1) further comprises: in mobile phone different user is provided with password according to customer requirements;
Described step 2) further comprise: mobile phone also requires to input password; Mobile phone is verified the username and password of input, if the verification passes, is then carried out step 3); If authentication failed then requires the user to re-enter user name and password.
Adopt method provided by the invention, use a mobile phone when different user is common, when perhaps the user of mobile phone lends this mobile phone other people and uses, can be with the partial function shielding of mobile phone, the function that makes other users can't learn that mobile phone has a conductively-closed also can't be used this function.
Description of drawings
Fig. 1 is a flow chart of the present invention.
Embodiment
As shown in Figure 1, the method for a kind of mobile phone customer management and functional shielding comprises the steps:
1) according to user name the functional configuration information of having put down in writing the function that this user has the right to use is set in mobile phone;
2) when the user starts shooting or lands again, mobile phone requires to input user name;
3) according to the user name of input, mobile phone reads the functional configuration information of this user name correspondence;
4) according to described functional configuration information, mobile phone carries out system configuration, after the function of putting down in writing in the value-added tax function configuration information, enters holding state.
Described functional configuration information also can be put down in writing all functions, but this user name function of having the right to use and the function of having no right to use are distinguished.When mobile phone is configured, only load the function that this user name has the right to use.
Described function comprises that the function that can not unload of installing before mobile phone dispatches from the factory and user are in the mobile phone function that unloads that the back installs of dispatching from the factory.After function of the new installation of certain user, if this function is set to the function that other user names have no right to use in the functional configuration table, then the user with other user names logins just can't use this function.
As shown in Figure 1, described step 1) further comprises: in mobile phone different user is provided with password according to customer requirements; Described step 2) further comprise: mobile phone also requires to input password; Mobile phone is verified the username and password of input, if the verification passes, is then carried out step 3); If authentication failed then requires the user to re-enter user name and password.
Wherein, described step 1) further comprises: the one or more user names of deletion in mobile phone, delete the pairing functional configuration information of this user name simultaneously.
Wherein, described step 1) further comprises:
The different rights group of default corresponding difference in functionality configuration information in mobile phone;
Requirement according to the user is gone into each bundle of permissions with user's status; User name in each bundle of permissions has same function rights of using, corresponding same functional configuration information.
Described step 3) further comprises: according to the bundle of permissions that user name belonged to of input, read the functional configuration information of this bundle of permissions correspondence.
Wherein, described step 1) further comprises: the one or more user names of deletion in mobile phone, the functional configuration information of the bundle of permissions correspondence of deleting this user name simultaneously and being belonged to.
Further, described step 1) can also comprise: according to user name privacy is set in mobile phone and checks configuration information; This privacy checks that configuration information put down in writing telephone directory and short message that this user has the right to check; Step 3) can also comprise: according to the user name of input, mobile phone reads the privacy of this user name correspondence and checks configuration information; Step 4) can also comprise: check configuration information according to described privacy, mobile phone shows that only described privacy checks telephone directory and the short message of putting down in writing in the configuration information.
Described privacy checks that configuration information also can put down in writing all telephone directories and short message, but this user name is had the right to use and the telephone directory and the short message of having no right to use are distinguished, and mobile phone shows telephone directory and the short message that this user has the right to check only.
Function that this user name haves no right to use and the telephone directory of having no right to check and information do not show in mobile phone interface, like this, can't learn with the user of this user name login to have described function, telephone directory and short message in the mobile phone.
Described password, functional configuration information, privacy check configuration information all be stored in external memory storage or nonvolatile random access memory (Non-Volatile Random Access Memory, NVRAM) in.
In addition, be provided with one in the mobile phone and have administrator right and user name that can not be deleted, the user name login mobile phone of use and management person's authority just has the authority that the functional configuration information that is provided with, privacy are checked configuration information and deleted other user names.For example, the user of the user name of use and management person's authority login mobile phone is that lack of competence is used MP3 and game function with the pairing functional configuration information setting of user name USER1.So, after also passing through checking with USER1 login mobile phone, mobile phone reads the corresponding functional configuration information with USER1, only load the functional module except that MP3 and recreation, MP3 functional module and game function module are not loaded, and this user can't use MP3 function and the game function in this mobile phone like this.
Above-described embodiment only is used to illustrate technological thought of the present invention and characteristics, and its purpose is to enable those skilled in the art to understand content of the present invention and implement according to this.Can not only limit protection scope of the present invention with the foregoing description, promptly all equivalent variations or modifications of making according to disclosed spirit and essence thereof all still belong to protection scope of the present invention.
Claims (7)
1. the method for mobile phone customer management and functional shielding is characterized in that comprising the steps:
1) according to user name the functional configuration information of having put down in writing the function that this user has the right to use is set in mobile phone;
2) when the user starts shooting or lands again, mobile phone requires to input user name;
3) according to the user name of input, mobile phone reads the functional configuration information of this user name correspondence;
4) according to described functional configuration information, mobile phone carries out system configuration, after the function of putting down in writing in the value-added tax function configuration information, enters holding state.
2. the method for mobile phone customer management as claimed in claim 1 and functional shielding is characterized in that,
Described step 1) further comprises: in mobile phone different user is provided with password according to customer requirements;
Described step 2) further comprise: mobile phone also requires to input password; Mobile phone is verified the username and password of input, if the verification passes, is then carried out step 3); If authentication failed then requires the user to re-enter user name and password.
3. the method for mobile phone customer management as claimed in claim 1 and functional shielding is characterized in that, described step 1) further comprises: the one or more user names of deletion in mobile phone, delete the pairing functional configuration information of this user name simultaneously.
4. the method for mobile phone customer management as claimed in claim 1 and functional shielding is characterized in that,
Described step 1) further comprises:
The different rights group of default corresponding difference in functionality configuration information in mobile phone;
Requirement according to the user is gone into each bundle of permissions with user's status;
Described step 3) further comprises: according to the bundle of permissions that user name belonged to of input, read the functional configuration information of this bundle of permissions correspondence.
5. the method for mobile phone customer management as claimed in claim 4 and functional shielding, it is characterized in that, described step 1) further comprises: the one or more user names of deletion in mobile phone, the functional configuration information of the bundle of permissions correspondence of deleting this user name simultaneously and being belonged to.
6. as the method for each described mobile phone customer management and functional shielding in the claim 1 to 5, it is characterized in that described functional configuration information stores is externally in the memory.
7. as the method for each described mobile phone customer management and functional shielding in the claim 1 to 5, it is characterized in that described functional configuration information stores is in nonvolatile random access memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100421170A CN101365195A (en) | 2008-08-27 | 2008-08-27 | Method for mobile phone customer management and functional shielding |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100421170A CN101365195A (en) | 2008-08-27 | 2008-08-27 | Method for mobile phone customer management and functional shielding |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101365195A true CN101365195A (en) | 2009-02-11 |
Family
ID=40391273
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2008100421170A Pending CN101365195A (en) | 2008-08-27 | 2008-08-27 | Method for mobile phone customer management and functional shielding |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101365195A (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101834949A (en) * | 2010-05-14 | 2010-09-15 | 董家植 | Intelligent application scheme of mobile phone |
CN102214279A (en) * | 2010-04-08 | 2011-10-12 | 苏州智童科技有限公司 | Method and device for controlling host user rights by using external memory equipment |
CN102238276A (en) * | 2011-04-06 | 2011-11-09 | 宇龙计算机通信科技(深圳)有限公司 | Application program access priority setting method, system and mobile terminal |
CN102368848A (en) * | 2011-10-12 | 2012-03-07 | 惠州Tcl移动通信有限公司 | Wireless communication device and configuration method thereof |
CN102917348A (en) * | 2012-10-30 | 2013-02-06 | 广东欧珀移动通信有限公司 | A multi-user smart phone and its login method |
CN102930195A (en) * | 2012-09-26 | 2013-02-13 | 北京百度网讯科技有限公司 | Method for sharing electronic equipment through fingerprints and electronic equipment |
CN102957804A (en) * | 2012-11-16 | 2013-03-06 | 深圳桑菲消费通信有限公司 | Multi-account application cell phone and use method thereof |
CN103049685A (en) * | 2013-01-23 | 2013-04-17 | 天津三星光电子有限公司 | User multi-code management system and method |
CN103427990A (en) * | 2012-05-18 | 2013-12-04 | 华为终端有限公司 | Authority authentication method and terminal device |
CN103530539A (en) * | 2012-07-03 | 2014-01-22 | 纬创资通股份有限公司 | Electronic device suitable for multiple users and login method |
CN103778361A (en) * | 2014-01-16 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Electronic equipment and function setting method thereof |
CN103886270A (en) * | 2014-03-31 | 2014-06-25 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and method for improving system safety |
CN103955639A (en) * | 2014-03-18 | 2014-07-30 | 深圳市中兴移动通信有限公司 | Motion sensing game machine and login method and device for motion sensing game |
CN104182672A (en) * | 2013-05-27 | 2014-12-03 | 中兴通讯股份有限公司 | Method for customizing proprietary system and mobile terminal |
CN104980570A (en) * | 2014-04-11 | 2015-10-14 | 昆山研达电脑科技有限公司 | Multi-user personalized configuration method for mobile equipment |
CN103020500B (en) * | 2011-09-28 | 2019-02-05 | 联想(北京)有限公司 | Login authentication method and electronic equipment |
CN110968326A (en) * | 2019-11-22 | 2020-04-07 | 连尚(新昌)网络科技有限公司 | Function processing method, device and computer storage medium |
CN113886805A (en) * | 2021-05-28 | 2022-01-04 | 荣耀终端有限公司 | Account login method, electronic device and chip |
-
2008
- 2008-08-27 CN CNA2008100421170A patent/CN101365195A/en active Pending
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102214279A (en) * | 2010-04-08 | 2011-10-12 | 苏州智童科技有限公司 | Method and device for controlling host user rights by using external memory equipment |
CN101834949A (en) * | 2010-05-14 | 2010-09-15 | 董家植 | Intelligent application scheme of mobile phone |
CN101834949B (en) * | 2010-05-14 | 2013-03-27 | 董家植 | Intelligent application scheme of mobile phone |
CN102238276A (en) * | 2011-04-06 | 2011-11-09 | 宇龙计算机通信科技(深圳)有限公司 | Application program access priority setting method, system and mobile terminal |
CN103020500B (en) * | 2011-09-28 | 2019-02-05 | 联想(北京)有限公司 | Login authentication method and electronic equipment |
CN102368848A (en) * | 2011-10-12 | 2012-03-07 | 惠州Tcl移动通信有限公司 | Wireless communication device and configuration method thereof |
CN102368848B (en) * | 2011-10-12 | 2014-12-10 | 惠州Tcl移动通信有限公司 | Wireless communication device and configuration method thereof |
WO2013053269A1 (en) * | 2011-10-12 | 2013-04-18 | 惠州Tcl移动通信有限公司 | Wireless communication device and configuration method thereof |
CN103427990A (en) * | 2012-05-18 | 2013-12-04 | 华为终端有限公司 | Authority authentication method and terminal device |
CN103530539A (en) * | 2012-07-03 | 2014-01-22 | 纬创资通股份有限公司 | Electronic device suitable for multiple users and login method |
CN102930195A (en) * | 2012-09-26 | 2013-02-13 | 北京百度网讯科技有限公司 | Method for sharing electronic equipment through fingerprints and electronic equipment |
CN102930195B (en) * | 2012-09-26 | 2016-12-21 | 北京百度网讯科技有限公司 | Method and the electronic equipment of electronic equipment is shared by fingerprint |
CN102917348A (en) * | 2012-10-30 | 2013-02-06 | 广东欧珀移动通信有限公司 | A multi-user smart phone and its login method |
CN102957804A (en) * | 2012-11-16 | 2013-03-06 | 深圳桑菲消费通信有限公司 | Multi-account application cell phone and use method thereof |
CN103049685A (en) * | 2013-01-23 | 2013-04-17 | 天津三星光电子有限公司 | User multi-code management system and method |
CN104182672A (en) * | 2013-05-27 | 2014-12-03 | 中兴通讯股份有限公司 | Method for customizing proprietary system and mobile terminal |
CN103778361A (en) * | 2014-01-16 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Electronic equipment and function setting method thereof |
CN103955639A (en) * | 2014-03-18 | 2014-07-30 | 深圳市中兴移动通信有限公司 | Motion sensing game machine and login method and device for motion sensing game |
CN103886270A (en) * | 2014-03-31 | 2014-06-25 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and method for improving system safety |
CN104980570A (en) * | 2014-04-11 | 2015-10-14 | 昆山研达电脑科技有限公司 | Multi-user personalized configuration method for mobile equipment |
CN110968326A (en) * | 2019-11-22 | 2020-04-07 | 连尚(新昌)网络科技有限公司 | Function processing method, device and computer storage medium |
CN110968326B (en) * | 2019-11-22 | 2024-01-30 | 连尚(新昌)网络科技有限公司 | Function processing method, device and computer storage medium |
CN113886805A (en) * | 2021-05-28 | 2022-01-04 | 荣耀终端有限公司 | Account login method, electronic device and chip |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101365195A (en) | Method for mobile phone customer management and functional shielding | |
CN102222200B (en) | Application program logging method and logging management system | |
CN101268470B (en) | Portable terminal device, address book transfer device, information display method in portable terminal device, and address book transfer method | |
CN103559455A (en) | Android device personal information protection method based on user identification | |
US20100130254A1 (en) | Portable communication terminal and program executed by portable communication terminal | |
US20140315517A1 (en) | System and Method for automatic Data Security Back-up and control for Mobile Devices | |
US8789136B2 (en) | Securing a device based on atypical user behavior | |
JP2005512425A (en) | Data storage and access to mobile devices and user modules | |
CA2811839A1 (en) | Method and apparatus for differentiated access control | |
CN103347116A (en) | System and method for setting multi-security modes in smart phone | |
CN102917098A (en) | Method and device for preventing important linkman from being wrongly deleted | |
WO2015085906A1 (en) | Method and device for enterprise data protection | |
CN101309478B (en) | Method for mobile terminal data access | |
CN103546555A (en) | Method and system for data management of mobile terminal | |
JP4135669B2 (en) | Mobile phone, personal data management method and management control program used for the mobile phone | |
CN104169938A (en) | Permission management method and permission management device | |
CN104915266B (en) | A kind of application program guard method and device | |
CN106658463A (en) | Operating system login method, device and terminal | |
CN101227683B (en) | Mobile terminal, system and method for securing data information | |
CN101742023B (en) | Method for managing user personalized information in digital photo frame and digital photo frame | |
CN1980429A (en) | Method for information secrete-keeping in mobile terminal | |
JP2007323397A (en) | Information processor | |
US20150372981A1 (en) | System and Method for Automatic Data Security, Back-up and Control for Mobile Devices | |
CN106453057A (en) | Method and terminal for preventing short message from being stolen | |
CN101808305A (en) | Method and system for controlling mobile terminal to display communication service and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20090211 |